Paper
14 March 2013 Research of trust model in P2P network based on trusted computing
Rong Li, Lei Li
Author Affiliations +
Proceedings Volume 8768, International Conference on Graphic and Image Processing (ICGIP 2012); 87682M (2013) https://doi.org/10.1117/12.2003491
Event: 2012 International Conference on Graphic and Image Processing, 2012, Singapore, Singapore
Abstract
In order to strengthen the security of P2P networks, it is necessary to build trust relationships between nodes of networks. However, the traditional trust evaluation models can't resist the attacks of Pseudospoofing and Pseudostheft effectively. To resolve the problems, in this paper, the trusted computing method is introduced into P2P networks, and an idea of group trust model based on trusted computing methods is proposed. In the process of trust evaluation, the model can realize the anonymous attestation of the node body, which improves the creditability of trust relationships between nodes and resolves the security problems of P2P networks.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Rong Li and Lei Li "Research of trust model in P2P network based on trusted computing", Proc. SPIE 8768, International Conference on Graphic and Image Processing (ICGIP 2012), 87682M (14 March 2013); https://doi.org/10.1117/12.2003491
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Network security

Information security

Computing systems

Computer security

Data modeling

Lithium

Agriculture

Back to Top